Upgrade to remove ads
IT Fundamentals - Internetworking
CC-BY-SA source: https://en.wikiversity.org/wiki/IT_Fundamentals/Internetworking
Terms in this set (67)
The practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.
Connects two or more data lines from different networks.
Connects data lines from a single network.
Support different physical types of network connections, such as copper cables, optical fiber, or wireless transmission.
Supports different networking communications protocol standards, and should be updated whenever security or performance issues have been corrected.
Service provided by a router to support dynamic IP address assignment.
A firewall, network address translation (NAT), and VPN handling.
WEP, WPA, and WPA2
Wireless network security protocols used to encrypt wireless traffic.
WEP and WPA
No longer considered secure.
Internet service provider
Provides services for accessing, using, or participating in the Internet using wired or wireless connections.
wired connection options
Twisted-pair phone lines, coaxial cable, and optical fiber cable.
Greater throughput/bandwidth, reliability, and availability.
wireless connection options
Wi-Fi, cellular, and satellite.
High mobility, but suffer from increased latency in data transfer and more security risks.
A generic term for the act of transmitting files over a computer network.
file transfer protocols
HTTP, HTTPS, FTP, FTPS, and SFTP.
HTTP and FTP
Clear-text protocols, which allow anyone to capture and view the network traffic.
HTTPS, FTPS, and SFTP
Use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.
peer-to-peer file sharing
Typically uses applications specifically designed for this task, and may include Internet peers, local ad hoc networks, and Bluetooth connections.
Peer-to-peer file sharing may have legal ramifications if this is shared.
A wireless networking standard operating in the 5 GHz band and supporting up to 54 Mbps data rates.
A wireless networking standard operating in the 5 GHz band and supporting up to 1 Gbps data rates.
A wireless networking standard operating in the 2.4 GHz band and supporting up to 11 Mbps data rates.
A wireless networking standard operating in the 2.4 GHz band and supporting up to 54 Mbps data rates.
A wireless networking standard operating in the 2.4 GHz or 5 GHz band and supporting up to 600 Mbps data rates.
A decentralized wireless network that does not rely on a pre existing infrastructure, such as routers or access points in managed wireless networks.
AES (Advanced Encryption Standard)
A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.
The proportion of time a system is in a functioning condition.
The bit-rate of available or consumed information capacity expressed typically in metric multiples of bits per second.
DMZ (demilitarized zone)
A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
DSL (Digital Subscriber Line)
A family of technologies that are used to provide internet access by transmitting digital data over telephone lines.
FTP (File Transfer Protocol)
An unencrypted standard network protocol that uses TCP ports 20 and 21 to transfer computer files from one host to another host.
FTPS (File Transfer Protocol over Secure Sockets Layer)
An extension of the File Transfer Protocol (FTP) that uses TCP port 990 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
HTML (Hypertext Markup Language)
The standard markup language used to create web pages.
HTTP (Hypertext Transfer Protocol)
An application protocol that uses TCP port 80 for distributed, collaborative, hypermedia information systems and the foundation of data communication for the World Wide Web.
HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
An extension of the Hypertext Transfer Protocol (HTTP) that uses TCP port 443 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
ISP (Internet Service Provider)
An organization that provides services for accessing, using, or participating in the Internet.
The time interval or delay between a source sending a packet and the destination receiving it.
The degree to which a computing device is able to be transported during normal usage.
NAT (Network Address Translation)
A methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.
A distributed application architecture that partitions tasks or work loads between equally privileged participants.
An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
A computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers.
QoS (Quality of Service)
The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.
A device that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.
The duplication of critical components or functions of a system with the intention of increasing reliability of the system.
The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.
Lists the routes to particular network destinations, and in some cases, metrics (distance, performance, or cost) associated with those routes.
SFTP (Secure File Transfer Protocol)
A network protocol that uses TCP port 22 to provide file access, file transfer, and file management functionalities designed as an extension of the Secure Shell protocol (SSH).
SOHO (Small Office / Home Office)
The category of business or cottage industry that typically involves from 1 to 10 workers.
SSH (Secure Shell)
A cryptographic network protocol that uses TCP port 22 for initiating secure text-based shell sessions on remote systems.
A unique identifier for a wireless LAN.
SSL (Secure Sockets Layer)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, superseded by Transport Layer Security (TLS).
A logically visible subdivision of an IP network.
An application protocol that uses TCP port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
The rate of successful message delivery over a communication channel.
TKIP (Temporal Key Integrity Protocol)
A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and used to replace WEP without requiring the replacement of legacy hardware.
TLS (Transport Layer Security)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, and which superseded Secure Sockets Layer (SSL).
URL (Uniform Resource Locator)
A reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.
VPN (Virtual Private Network)
Extends a private network across a public network, such as the Internet, allowing a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network.
WAN (Wide Area Network)
A network that covers a broad geographic area using leased telecommunication lines.
WI-Fi (Wireless Fidelity)
A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.
WEP (Wired Equivalency Privacy)
The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA.
WLAN (Wireless Local Area Network)
A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.
WPA (Wireless Protected Access)
A wireless computer network security protocol based on TKIP.
WPA2 (Wireless Protected Access 2)
A wireless computer network security protocol based on AES.
WPS (Wireless Protected Setup)
A network security standard that attempted to allow users to easily secure a wireless home network using a PIN rather than long pass phrases.
THIS SET IS OFTEN IN FOLDERS WITH...
IT Fundamentals - Security
IT Fundamentals - Safety
IT Fundamentals - Support
IT Fundamentals - Mobile Devices
YOU MIGHT ALSO LIKE...
Network Services Acronyms : Need to Know (Defined)
Networking Chapter 2
BUS 401 Chp 7
Block 5 avf
OTHER SETS BY THIS CREATOR
IT Fundamentals - Business Continuity
IT Fundamentals - Troubleshooting
IT Fundamentals - Security Practices
IT Fundamentals - Security Concepts